Sunday, January 26, 2025
HomeAndroidErrorFather Hackers Attacking & Control Android Device Remotely

ErrorFather Hackers Attacking & Control Android Device Remotely

Published on

SIEM as a Service

Follow Us on Google News

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to target financial and social media apps, has continued to evolve and spread through various forks and variants. 

Recent research has uncovered a new campaign, dubbed ErrorFather, which leverages the Cerberus source code and utilizes a multi-stage dropper mechanism to deploy the banking trojan payload. 

The ErrorFather campaign, detected in September 2024, has seen a significant increase in malicious samples in recent weeks, indicating ongoing activity and the potential for widespread harm to unsuspecting users.

 ErrorFather Telegram bot

The malware utilizes a multi-stage dropping technique, where the first-stage dropper installs a second-stage dropper from its assets using a session-based installation. 

While the second-stage dropper is packed and relies on a native library (libmcfae.so) to decrypt and load the final payload. The final payload, decrypted.dex, contains malicious functionalities like keylogging, overlay attacks, and remote access capabilities.

The ErrorFather campaign utilized a modified version of the Cerberus banking trojan, which it disguised through obfuscation and code reorganization. 

Third-stage dropper loading final payload

While initially detected as a new banking trojan based on its detection count, deeper analysis revealed strong code similarities with Cerberus, particularly in its shared preference settings and structure. 

However, the C&C structure of the ErrorFather variant differed from the original Cerberus and the more recent Phoenix botnet, indicating a unique evolution of the malware.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

The malware retrieves C&C server lists using two methods: statically from a primary C&C server and dynamically using a DGA, which generates domains based on the current Istanbul time using MD5 and SHA-1 hashing and appends one of four extensions. 

DGA used in the ErrorFather campaign

When the primary C&C server is unavailable, the malware attempts to connect to the generated domains, which was also observed in the Alien malware, but with variations in domain extension and lack of a static list.

It performs various actions, including sending device information, retrieving and storing data from the server, and capturing screen images for VNC functionality by leveraging accessibility services to gather sensitive data like keystrokes and contacts and sends error logs to the C&C server. 

The malware also checks for registered users and sends device status updates, indicating its continuous monitoring and control over the infected device.

Receives HTML injection file

The Cerberus malware employs an overlay attack to deceive victims into entering sensitive information and identifies potential targets by sending a list of installed applications. Once a target is found, the malware receives the corresponding HTML injection page. 

When the victim interacts with the target app, the malware overlays a fake phishing page, tricking the victim into divulging login credentials and credit card details, which enables the malware to carry out financial fraud.

According to the CRIL, the ErrorFather campaign, a Cerberus-based banking Trojan, leverages VNC, keylogging, and HTML injection to steal financial information. 

Despite being older malware, the modified Cerberus has evaded detection, where cybercriminals continue to repurpose leaked malware source code, highlighting the ongoing threat of Cerberus-based attacks.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...